Skip to content

Commit a760afd

Browse files
committed
first draft
1 parent 4bf8086 commit a760afd

File tree

8 files changed

+63
-26
lines changed

8 files changed

+63
-26
lines changed

articles/defender-for-iot/organizations/detect-windows-endpoints-script.md

Lines changed: 33 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -45,25 +45,24 @@ The script described in this article is supported for the following Windows oper
4545

4646
## Download the script
4747

48-
Offline WMI
49-
To preform offline WMI complete the following steps:
50-
1. Download the script, extract it and run 'run.bat' as administrator directly on the Windows endpoint
51-
2. Import the received output file to the sensor - cx_snapshot_[machinename]_[current date time].
52-
3. In Data mining's Devices applications report, you can view the device applications.
53-
4. Based on this information, the Windows device CVE list will be displayed in Azure if the sensor is cloud-connected
48+
In order to run the script, you first need to download it from the OT sensor console.
5449

55-
:::image type="content" source="media/detect-windows-endpoints-script/download-wmi-script.png" alt-text="Screenshot of where to download WMI script." lightbox="media/detect-windows-endpoint-script/download-wmi-script.png":::
50+
1. Sign into your OT sensor console, and select **System Settings** > **Import Settings** > **Windows Information**.
51+
52+
1. Select **Download script**.
53+
54+
:::image type="content" source="media/detect-windows-endpoints-script/download-wmi-script.png" alt-text="Screenshot of where to download WMI script." lightbox="media/detect-windows-endpoint-script/download-wmi-script.png":::
5655

5756
## Run the script
5857

59-
This procedure describes how to obtain, deploy, and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
58+
This procedure describes how to deploy and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
6059

6160
The script you run to detect enriched Windows data is run as a utility and not as an installed program. Running the script doesn't affect the endpoint.
6261

63-
1. To acquire the script, [contact customer support](mailto:support.microsoft.com).
64-
6562
1. Deploy the script once, or using ongoing automation, using standard automated deployment methods and tools.
6663

64+
1. Download the WMI script as described [earlier](#download-the-script).
65+
6766
1. Copy the script to a local drive and unzip it. The following files appear:
6867

6968
- `start.bat`
@@ -95,11 +94,34 @@ After having run the script as described [earlier](#run-the-script), import the
9594

9695
1. Select **Import File**, and then select all the files (Ctrl+A).
9796

97+
:::image type="content" source="media/detect-windows-endpoints-script/import-wmi-script.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoint-script/import-wmi-script.png":::
98+
9899
1. Select **Close**. The device registry information is imported and a successful confirmation message is shown.
99100

100101
If there's a problem uploading one of the files, you'll be informed which file upload failed.
101102

103+
## Offline WMI
104+
105+
To preform offline WMI:
106+
107+
1. [Download the script](#download-the-script), then extract it.
108+
109+
1. Run `run.bat` as administrator directly on the Windows endpoint.
110+
111+
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the machine name and the current date and time of the snapshot with the following syntax: `cx_snapshot_[machinename]_[current date time]`.
112+
113+
1. [Import](#import-device-details) the received output file to the sensor.
114+
115+
**To view the devices applications:**
116+
117+
1. Sign into your OT sensor console, and select **Data mining**.
118+
119+
1. Select **+ Create report** to [create a custom report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report). In the **Choose Category** field, select **Devices Applications**. For example:
120+
121+
:::image type="content" source="media/detect-windows-endpoints-script/devices-applications-report.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoint-script/devices-applications-report.png":::
122+
123+
Based on this information, the Windows device CVE list will be displayed in Azure if the sensor is cloud-connected.
124+
102125
## Next steps
103126

104127
For more information, see [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md) and [Import extra data for detected OT devices](how-to-import-device-information.md).
105-

articles/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map.md

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
3131
- Starred devices are those that had been marked as important
3232
- Devices with no alerts are shown in black, or grey in the zoomed-in connections view
3333

34-
For example:
34+
For example:
3535

3636
:::image type="content" source="media/how-to-work-with-maps/device-map-default.png" alt-text="Screenshot of a default view of an OT sensor's device map." lightbox="media/how-to-work-with-maps/device-map-default.png":::
3737

@@ -45,7 +45,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
4545
- The number of devices grouped in a subnet in an IT network, if relevant. This number of devices is shown in a black circle.
4646
- Whether the device is newly detected or unauthorized.
4747

48-
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
48+
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
4949

5050
### Modify the OT sensor map display
5151

@@ -73,7 +73,6 @@ To see device details, select a device and expand the device details pane on the
7373
- Select **Event Timeline** to jump to the device's [event timeline](how-to-track-sensor-activity.md)
7474
- Select **Device Details** to jump to a full [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
7575

76-
7776
### View IT subnets from an OT sensor device map
7877

7978
By default, IT devices are automatically aggregated by [subnet](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets), so that the map focuses on your local OT and IoT networks.
@@ -94,7 +93,6 @@ By default, IT devices are automatically aggregated by [subnet](how-to-control-w
9493
1. Sign into your OT sensor and select **Device map**.
9594
1. Select one or more expanded subnets and then select **Collapse All**.
9695

97-
9896
## Create a custom device group
9997

10098
In addition to OT sensor's [built-in device groups](#built-in-device-map-groups), create new custom groups as needed to use when highlighting or filtering devices on the map.
@@ -103,7 +101,7 @@ In addition to OT sensor's [built-in device groups](#built-in-device-map-groups)
103101

104102
1. In the **Add custom group** pane:
105103

106-
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
104+
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
107105
- From the **Copy from groups** menu, select any groups you want to copy devices from.
108106
- From the **Devices** menu, select any extra devices to add to your group.
109107

@@ -113,12 +111,11 @@ Use one of the following options to import and export device data:
113111

114112
- **Import Devices**. Select to import devices from a pre-configured .CSV file.
115113
- **Export Devices**. Select to export all currently displayed devices, with full details, to a .CSV file.
116-
- **Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
117-
114+
- **Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
118115

119116
## Edit devices
120117

121-
1. Sign into an OT sensor and select **Device map**.
118+
1. Sign into an OT sensor and select **Device map**.
122119

123120
1. Right-click a device to open the device options menu, and then select any of the following options:
124121

@@ -142,13 +139,12 @@ You can only merge [authorized devices](device-inventory.md#unauthorized-devices
142139

143140
> [!IMPORTANT]
144141
> You can't undo a device merge. If you mistakenly merged two devices, delete the devices and then wait for the sensor to rediscover both.
145-
>
146142
147143
**To merge multiple devices**:
148144

149145
1. Sign into your OT sensor and select **Device map**.
150146

151-
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
147+
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
152148

153149
1. At the prompt, select **Confirm** to confirm that you want to merge the devices.
154150

@@ -189,7 +185,6 @@ You may have situations where you'd want to handle multiple notifications togeth
189185

190186
When you handle multiple notifications together, you may still have remaining notifications that need to be handled manually, such as for new IP addresses or no subnets detected.
191187

192-
193188
### Device notification responses
194189

195190
The following table lists available responses for each notification, and when we recommend using each one:
@@ -233,7 +228,6 @@ On the on-premises management console, zone maps show all network elements relat
233228

234229
1. Right-click a device shown in red and select **View alerts** to jump to the **Alerts page**, with alerts filtered only for the selected device.
235230

236-
237231
## Built-in device map groups
238232

239233
The following table lists the device groups available out-of-the-box on the OT sensor **Device map** page. [Create extra, custom groups](#create-a-custom-device-group) as needed for your organization.
@@ -257,4 +251,3 @@ The following table lists the device groups available out-of-the-box on the OT s
257251
## Next steps
258252

259253
For more information, see [Investigate sensor detections in a Device Inventory](how-to-investigate-sensor-detections-in-a-device-inventory.md).
260-
147 KB
Loading
135 KB
Loading
489 Bytes
Loading

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,9 @@ To understand whether a feature is supported in your sensor version, check the r
101101

102102
**Supported until**: 03/2024
103103

104-
- add items here
104+
- [Download WMI script from OT sensor console](detect-windows-endpoints-script.md#download-the-script)
105+
- [Automatically resolved notifications for operating system changes and device type changes](how-to-work-with-the-sensor-device-map.md#device-notification-responses)
106+
- [UI enhancements when uploading SSL/TLS certificates](how-to-deploy-certificates.md#deploy-a-certificate-on-an-ot-sensor)
105107

106108
### 22.3.6 / 22.3.7
107109

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,27 @@ Features released earlier than nine months ago are described in the [What's new
2020

2121
|Service area |Updates |
2222
|---------|---------|
23-
| **OT networks** | **Sensor version 22.3.8**: <br>- add items here |
23+
| **OT networks** | **Sensor version 22.3.8**: <br>- [Download WMI script from OT sensor console](#download-wmi-script-from-ot-sensor-console) <br>- [Automatically resolved OS and device type notifications](#automatically-resolved-os-and-device-type-notifications) <br>- [UI enhancement when uploading SSL/TLS certificates](#ui-enhancement-when-uploading-ssltls-certificates) |
24+
25+
### Download WMI script from OT sensor console
26+
27+
The WMI script can now be downloaded from the OT sensor console.
28+
29+
For more information, see [Download the script](detect-windows-endpoints-script.md#download-the-script)
30+
31+
### Automatically resolved OS and device type notifications
32+
33+
Starting in version 22.3.8, selected notifications on the OT sensor's **Device map** page are now automatically resolved if they aren't dismissed or otherwise handled within 14 days.
34+
35+
After updating your sensor version, the **Operating system changes** and **Device type changes** notifications no longer appear.
36+
37+
For more information, see [Device notification responses](how-to-work-with-the-sensor-device-map.md#device-notification-responses)
38+
39+
### UI enhancement when uploading SSL/TLS certificates
40+
41+
The OT sensor version 22.3.8 has an enhanced **SSL/TLS Certificates** configuration page for defining your SSL/TLS certificate settings and deploying a CA-signed certificate.
42+
43+
For more information, see [Deploy a certificate on an OT sensor](how-to-deploy-certificates.md#deploy-a-certificate-on-an-ot-sensor).
2444

2545
## March 2023
2646

0 commit comments

Comments
 (0)